Final Exam Flashcards

(393 cards)

1
Q

the amount or number of signals that a wire can carry

A

bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

space between floors

A

plenum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the physical address assigned to a NIC?

A

MAC address

he physical address, also known as the MAC address, assigned to a NIC by its manufacturer is 48 bits long. Because of the way this address is divided up into two 24 bit parts, each manufacturer has only 16 million or so unique addresses they can use before the manufacturer has begun reusing physical addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ethernet II

A

(Ethernet DIX) can be used directly by the IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

rollover cable

A

used to hook Ethernet connections together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

router

A

used to move packets around a larger network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The encapsulation unit on the Network layer of the OSI Model is _____

A

Packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NFT

A

(Network Fault Tolerance) bonding technique that provides network redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RJ-22

A

Older style phones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Electromagnetic Interference, copper trying to overcome electromagnetic fields

A

EMI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Recommended Standard 232, a standard used for serial data cables connecting equipment

A

RS-232

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

shielded twisted pair

A

STP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define: protocol

A

a set of rules to describe how a task works in a network environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Neighbor table

A

contains information about the routers that are directly connected to the current router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define: Data Link layer

A

concerned with moving data from one computer to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

EGP

A

used to exchange routing information between autonomous systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

RG-59

A

low-power video and audio transmission (DVDs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Public Class C IP range

A

192.0.0.0 - 223.255.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

serial

A

one bit is sent at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Authoritative name servers

A

attached to domain servers and responsible for answering requests received about the domain space they are part of.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

NIC

A

(Network Interface Card) connects a computer to a computer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

baseband

A

a signal that has a very narrow frequency range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

TLS

A

(Transport Layer Security) a protocol that ensures privacy between communicating applications and their users on the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Registered ports

A

used consistently on all systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Novel Ethernet
(Ethernet\_802.3) does not include a Layer 2 Data Link identifier
26
SSH
(Secure Shell) a cryptographic (encrypted) network protocol to allow remote login and other network services to operate securely over an insecure network.
27
BPL
Broadband over PowerLine
28
low-power video and audio transmission (DVDs)
RG-59
29
What is used to determine which upper-layer protocols, services, and processors each data segment is intended for?
port Protocols on the Transport layer have port addresses, also known as ports. These ports are used to determine which upper-layer protocols, services, and processes each data segment is intended for. Port addresses ensure that the correct protocol, service, or process can get the data intended for it. The two main protocols on the Transport layer, UDP and TCP, both use ports.
30
trunking
provides network access to many clients by sharing a set of lines or frequencies
31
Define: Session layer
manages dialog between networked devices.
32
Name servers
database of all the name domains on the Web
33
SMTP
(Simple Mail Transport Protocol)
34
latency
time interval between responses
35
supplies a signal to many connected pairs
feeder cable
36
multiple signals
broadband cable
37
IS-IS
(Intermediate System to Intermediate System) used to determine routing tables within an autonomous system using link state routing
38
UDP
(User Datagram Protocol) connection-less counterpart of TCP, does not guarantee reliable delivery and is primarily used to give other protocols access to datagram services
39
What is a multiport repeater?
hub Hubs work as though they are the bus of a larger network. When a computer connected to one port of a hub want to connect to a computer connected to a different port on a hub, it has to broadcast the signal to all devices connected to that hub. In this way, a hub acts as a bus. As a signal comes into a hub, it is regenerated or repeated and sent to its destination.
40
What helps protect data that is sent using a wireless network?
encryption Encryption is where a device such as a computer or a WAP takes the data that it is sending out and first runs an algorithm on it so that it cannot be read without first having the key to read it. This capability increases the security of a network by making it more difficult for an outsider to read what is passing across a network.
41
Application Layer Protocols
designed to carry out specific purposes or functions
42
In what type of technology is the whole message routed to its destination one hop at a time?
message switching In message switching, whole messages are routed to their destination one hop at a time. Over time, the message switching idea evolved into what we call packet switching today. With message switching, the entire message is sent out at once.
43
What is referred to as a group of hosts in the Data-Link layer that share a common set of communications requirements and can be isolated from other groups?
VLAN In its most basic form, a VLAN (short for Virtual LAN) enables you to break up a much larger network into smaller networks within the Data-Link layer of the OSI model. In other words, a VLAN refers to a group of hosts that share a common set of communications requirements whether or not they are attached to the same device.
44
content-based access method
accessing a network in which different nodes compete to see which node can send out its packet first
45
Port addresses/ports
determine which upper-layer protocols, services, and processes each data segment is intended for
46
channel
specific subrange of radio frequencies that has been set aside within 2.4 GHz
47
port bonding
associated with a specific protocol, service, application
48
1MHz, North American telephone system
CAT 1
49
noise
transmission of information
50
connect a host or router to a switch or hub
straight-through cable
51
straight tip
ST connector
52
IGP
(Interior Gateway Protocol) used for exchanging routing information between gateways (commonly routers) within an autonomous system
53
The encapsulation unit on the Presentation layer of the OSI Model is \_\_\_\_\_
Data
54
Define: connection-oriented protocol
asks for verification that a data packet has reached its destination
55
Today, what type of cable is the most common for Ethernet?
UTP Today, virtually all Ethernet cabling is done with either UTP or fiber. Because UTP is easier to configure, is less expensive, and has been widely available longer, UTP is much more common then fiber.
56
coaxial cable
center conductor made of copper surrounded by plastic
57
192.130.277.277/8
58
Define: MAC
Media Access Control sublayer, provides access control to the media just as its name implies
59
collision domain
A physical region of a LAN in which data collisions can occur
60
Define: frame
The packet becomes this in the Data Link layer.
61
cable with connectors on both ends
patch cable
62
light emitting diodes
LEDs
63
routing table
contains the routes to the various destinations
64
What port does HTTP use by default?
80Hyper-Text Transfer Protocol (HTTP) uses TCP port 80 to display web pages via a browser.
65
local connector
LC
66
Ethernet bonding
combining the bandwidth from two ore more Ethernet links
67
transmission of information
noise
68
main distribution frame
MDF
69
((N-X)) Signaling stands for:
signaling type
70
Define: tailer
contains error correction information.
71
EMI
Electromagnetic Interference, copper trying to overcome electromagnetic fields
72
. What represents the number of routers it takes to get from one destination to another?
hops Within a routing table database are several information fields. The three most common of these fields are the network ID of the destination network, the cost of path the packet will need to take to get to the destination network, and the next hop. The cost refers to the network cost (not money cost) of getting to the destination network, which is based on available bandwidth, speed and other factors.
73
Public Sswitched Telephone Network
PSTN
74
Define: encapsulation
the process of taking data from a previous layer of the OSI Model and carrying it forward into the next layer.
75
Define: packet
The segment becomes this in the Networking layer.
76
What media type can carry multiple data signals at the same time?
broadband Baseband means is that a cable can carry only one signal one way at one time. In the case of most modern Ethernet cables, this means that there is one line for sending signals and another line for receiving signals inside an Ethernet cable.
77
passive hub
joins wires from several stations in a star configuration
78
You are given the following address: 00-90-4B-AD-2A-AC What type of address is this?
MAC address The physical address, also known as MAC address, assigned to a NIC by its manufacturer is 48 bits long. Because of the way this address is divided up into two 24-bit parts, each manufacturer has only 16 million or so unique addresses to use before the manufacturer has to start reusing physical addresses.
79
out-of-order packet delivery
Packets arrive in a different order than the one they were sent in
80
What is the 7th Layer of the OSI Model?
Application
81
MT-RJ or MTRJ
mechanical transfer registered jack
82
What type of hub does not amplify or resend a signal?
passive hub A passive hub is really nothing more than a cable splitter. If you have seen old cable TV connections where a coaxial cable is connected to a cable splitter and two or more cables come out, you have seen what is essentially a passive hub. These types of devices are not used very commonly in data networks.
83
Permanent host group
a host group with permanent IP addresses
84
Static routing
uses a manually-configured routing entry, rather than information from a dynamic routing traffic
85
When a DNS client needs to resolve a host name to an IP address, where will it first check?
its own DNS cache When you open your web browser and put in a URL, the browser checks the local web cache to see if the IP address of the entered URL can be found. If it cannot be found, your computer sends a query to your ISP’s DNS server asking it for the URL’s IP address.
86
UTP
unshielded twisted pair, used in all types of twisted pair Ethernet networks
87
physical address
MAC address; physical binary address that every network device is given when it is created by its manufacturer
88
Define: Half-duplex
a device can only send or recieve
89
classful IP address
a network addressing architecture used in the Internet from 1981 until 1993. The method divides the address space for Internet Protocol Version 4 (IPv4) into five address classes.
90
What protocol is used to provide bi-directional interactive command-line access to either a remote or local host?
TELNET TELNET, short for TErminaL NETwork, is used to provide bi-directional interactive command-line access to either a remote or local host. TELNET was first introduced in 1969 in RFC 15. In 1983, TELNET was extended in RFC 854. TELNET client software can be found for pretty much every computer platform out there.
91
sqare connector
SC
92
broadband cable
multiple signals
93
Define: port address
a unique address inside the computer associated with a specific protocol, service, or application
94
Define: bits
frames converted in the Physical layer.
95
used to hook Ethernet connections together
rollover cable
96
Which type of routing protocol are RIP and IGRP?
distance vector routing protocol The simplest type of routing protocol is a distance vector routing protocol. Some examples of distance vector routing protocols are RIP, RIPv2, and IGRP. In a distance vector routing protocol, each router periodically sends an update of its routing table to all routers directly connected to it. In this way, periodically the entire network of routers gets updated. The time it takes for this update to take place is called convergence.
97
SC
subscriber connector
98
128.0.0.0 - 191.255.255.255
public class B
99
single-mode fiber, high-speed, long-distance fiber-optic cable
SMF
100
Media converter
connects two dissimilar media types such as twisted pair with fiber optic cabling.
101
bridge
connects two or more local area networks at layer 2.
102
N refers to signal rate in Mbps
((N-X)) N stands for:
103
MMF
multimode fiber, uses light to communicate a signal
104
Define: OSI Model
framework and reference model to explain how different networking technologies work together and interact.
105
1.0.0.0 - 126.255.255.255
public class A
106
Denial of Service attack
using pings across a large range of computers to bring down a server
107
channel bonding
uses two or more channels to move data
108
Define: data
Top three layers of the OSI Model: The Application, Presentation, and Session layers.
109
The two most important portocols on the Transport layer of the TCP/IP Model are \_\_\_\_\_and \_\_\_\_\_
TCP & UDP
110
Define: Network layer
moves data in the form of packets from one end of the network to the other.
111
Ethernet DIX
(Ethernet II) can be used directly by the IP
112
10Base-2, thin coaxial cable
Thin Ethernet (Thinnet)
113
SMF
single-mode fiber, high-speed, long-distance fiber-optic cable
114
SIP
(Session Initiation Protocol) protocol for signaling and controlling multimedia communication sessions
115
when two improperly shielded copper wires run too close together so that signals become mixed
crosstalk
116
switch
connecting multiple wires, allowing them to communicate simultaneously
117
public class B
128.0.0.0 - 191.255.255.255
118
crossover cable
TIA/EIA 568A is used on one end of a cable and TIA/EIA 568B is used on the other end
119
straight-through cable
connect a host or router to a switch or hub
120
At what OSI layer do routers operate?
Network layer Network Routers are networking devices used to move packets around a larger network. To do this, they have to be very intelligent and able to read data packets to know where they are intended to go and where they have come from. Because routers are meant to relay based on IP addresses, they work on the Network layer.
121
public class C
192.0.0.0 - 223.255.255.255
122
Define: physical address
MAC address
123
RAIN
(Redundant Array of Independent Nodes) protects data stored at the file-system level by providing redundancy across network nodes
124
Block
data broken into segments that contain headers
125
ST connector
straight tip
126
steady state
all the routers in a network are updated/converged
127
broadband
transports multiple signals and traffic types.
128
VLAN
(Virtual LAN) groups users by logical addresses into a virtual LAN through a switch or router.
129
tracert
the Windows implementation of a trace route
130
(CIDR)
Classless inter-domain routing; a standard notation that indicates what portions of an IP address are used for network ID and host ID
131
CAT 6
250MHz
132
EUI-60
60-bit Extended Unique Identifier; a MAC address where the host extension is 36-bits long
133
Define: Application layer
contains all the services that are needed by the application
134
LC
local connector
135
feeder cable
supplies a signal to many connected pairs
136
CAT 4
20 MHz
137
private class C
192.168.0.0 - 192.168.255.255
138
firewall
used to prevent unauthorized packets into the network
139
((N-X)) N stands for:
N refers to signal rate in Mbps
140
multimode fiber, uses light to communicate a signal
MMF
141
Define: header
describes what each layer should do.
142
16MHz, 10Mbps
CAT 3
143
content switch
distribute user requests to servers based on Layer 7 payload.
144
The primary function of the Physical Layer
Transfer the bits
145
TCP/IP Protocol Suite
used for Internet commuinications
146
Define: Routing
the ability of the various network devices to move data packets from their source to their destination.
147
Ethernet is considered \_\_\_\_\_\_\_\_\_\_\_.
baseband Ethernet is what is called a baseband technology. Most modern Ethernet cables have one line for sending signals and another line for receiving signals.
148
classful subnet mask for a Class B IP address
255.255.0.0
149
What routing type is manually defined?
static routing The most basic way of building routing tables is to manually create one in a router. As new routes are needed on a network or old routes change, the routing tables must be manually changed or updated on the affected routers. This process is called static routing, which is time-consuming and prone to errors.
150
10MHz, 4Mbps
CAT 2
151
20 MHz
CAT 4
152
TIA/EIA 568A and 568B
wiring standards agreed upon by over 60 ISP vendors
153
What measurement is used to choose the best route to a specific location?
metrics The purpose of any routing protocol is to compile a table listing all routes known to it so that IP can use the table to find the best route to a specific location. The measurements used by a routing protocol to determine the best routes available to it are called metrics.
154
plenum
space between floors
155
What mechanism is used to send one set of packets to multiple hosts at the same time?
multicasting IP multicasting is basically an IP host’s capability to send a datagram or data packet to all IP hosts within a host group. A host group consists of all the IP computers currently connected to a particular IP multicast host that are set to receive the same transmission from that host. These host groups can be set to contain 0 or more hosts.
156
hop
one portion of the path between source and destination
157
BGP
(Border Gateway Protocol) designed to exchange routing and reachability information between autonomous systems (AS) on the Internet.
158
159
What happens when two computers broadcast at the same time on the network, causing both sets of data to be garbled?
collision When two different computers need to send data at the same time, they will listen to the network. If neither computer hears any activity on the network, they both will conclude that they are clear to send data at that time. As a result, both computers end up sending data packets simultaneously; however, because only one data packet can be on the network cable at one time, a collision occurs. The collision results in a slight power spike on the network as well as destruction of the data in the two packets.
160
public IP address
can be used on the Internet; must be registered with the Network Information Center
161
EIGRP
(Enhanced Interior Gateway Routing Protocol) used on a computer network to help automate routing decisions and configuration
162
Which connectionless transport protocol does not guarantee reliable delivery?
UDP User Datagram Protocol (UDP) is the connectionless counterpart of TCP. It does not guarantee reliable delivery and is used primarily to give other protocols, such as IP, access to datagram services like port numbers. Due to the limited functionality provided by UDP, the header is correspondingly much smaller and less complex.
163
What command is used to test IP connectivity between two hosts?
ping Ping is a network administration utility that is used to test connectivity to specific nodes on a network and to measure the round-trip time it takes for a packet to get to a specific destination and back.
164
RJ-11
Used to connect a phone to a phone jack
165
Thin Ethernet (Thinnet)
10Base-2, thin coaxial cable
166
intermediate distribution frame
IDF
167
demarc
demarcation point, last point of responsibility from the ISP
168
patch cable
cable with connectors on both ends
169
DNS
(Domain Name System) the protocol that converts URLs to IP addresses
170
broadband and home video coaxial cable connector
F-connector
171
multilayer switch
switches on OSI layer 2 like an ordinary network switch and provides extra functions on higher OSI layers.
172
amount of actual data that is being carried
throughput
173
port mirroring
Cross connecting two or more ports on a network switch so that traffic can be simultaneously sent to a network analyzer or monitor connected to another port.
174
When you use port authentication, what is used to limit access to the network?
MAC addresses Port authentication provides security to the entire network because it limits access via a particular port to pre-authorized MAC addresses.
175
The primary job of the Network layer is to
Perform routing functions and a means of transmitting data packages.
176
Which Ethernet standard was developed to work over fiber?
100Base-FX 100Base-FX is the version of Fast Ethernet that is intended to be used over fiber-optic cable. Introduced at the same time as 100Base-TX, 100Base-FX was part of the same IEEE 802.3y standard.
177
Which protocol is used to resolve host names to IP addresses?
DNS Domain Name System (DNS) makes it possible for us to use the Internet the way we do. DNS is the protocol that converts all those URLs we can easily remember to IP addresses that the Internet can use.
178
Trace route
a utility used to report back each hop along a route to a specific IP destination.
179
center conductor made of copper surrounded by plastic
coaxial cable
180
The two sublayers of the Data Link layer are \_\_\_\_\_, and \_\_\_\_\_
LLC & MAC
181
classful subnet mask for a Class A IP address
255.0.0.0
182
topology table
an aggregation of the routing tables of all routers connected to current router
183
TCP
(Transmission Control Protocol) provide communication services between Application layer services, protocols, and processes and the IP.
184
or Network Interface Device (NID), used between the ISP and internal network
smart jack
185
Which protocol translates an IP address into a MAC address?
ARP In network addressing—when a packet is passed along a network via routers—the MAC address is actually changed at each hop so that the data frame can move on to the next hop in its journey. The Address Resolution Protocol (ARP)is responsible for changing the MAC address. Part of ARP’s job is to determine what the MAC address is for the next hop and then adjust the frame accordingly so that the frame can be moved to the next hop.
186
What was the first Ethernet standard used on UTP?
10Base-T While 10Base-T was not the first XBase-Y standard developed, it was the first twisted-pair XBase-Y standard developed. In 1990 IEEE 802.3i formalized the 10Base-T standard. 10Base-T used CAT 3 UTP and could carry 10 mbps throughput for a distance of 100 meters. 10Base-T was a baseband technology. This standard became known as Twisted-Pair Ethernet.
187
Resolvers
the clients that make requests of the Domain Name System
188
data corruption
the data contained in the packet is corrupted
189
CAT 1
1MHz, North American telephone system
190
crosstalk
when two improperly shielded copper wires run too close together so that signals become mixed
191
CSMA/CD
(Carrier Sense Multiple Access with Collision Detection) used most notably in local area networking using early Ethernet technology.
192
FTP
(File Transport Protocol) a standard network protocol used to transfer computer files from one host to another host over a TCP-based network, such as the Internet
193
100 MHz, transmits on two pairs
CAT 5
194
SFF connector
small form factor connector
195
BNC connector
attach stations to the network
196
What type of port ranges from 0 to 1023?
well-known ports The first group is called the well-known ports. Port numbers in this group range from 0–1023. Well-known ports can be assigned only by the Internet Assigned Numbers Authority (IANA). The ports in this range, according to IANA, can be used only by the system or root processes and by programs executed by privileged users.
197
TELNET
(Terminal Network) an application layer protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection
198
plenum-rated cable
used for buildings that catch fire
199
What is used to monitor the activity of a network and notify network administrators when it identifies something as suspicious?
IDS Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are related technologies. An IDS usually sits inside a network and monitors the network’s activities. When something suspicious is noted, the IDS then notifies network administrators so that they can take steps to stop the suspect activity. Because an IDS only monitors activity, it is considered passive.
200
active hub
regenerates signals on the output side to keep the signal strong
201
Ethernet SNAP
allows larger number of protocols, a better Ethernet\_802.2
202
The Application layer of the TCP/IP Model corresponds to the blank layer(s) of the OSI model
Session and Presentation
203
The process of moving data from one layer of the OSI model to the next layer is called
encapsulation
204
baseband cable
can only carry 1 signal at a time
205
RFI
Radio Frequency Interference
206
routed protocols
the process of selecting best paths in a network
207
Define: simplex
one-way communications
208
RTP
(Real-Time Transport Protocol) a packet format for delivering audio and video over IP networks
209
What is a set of agreed-upon instructions designed to allow computers to communicate to each other across a network connection?
protocol In computer networking, a protocol is a set of agreed-upon instructions designed to allow computers to communicate to each other across a network connection. Many protocols are used in networking because many different tasks need to be done to allow computers to communicate with each other.
210
MAC address filtering
only a pre-programmed MAC address is allowed access to a specific WAP
211
MLT
(Multilink trunking) binds ports together to allow fault tolerance or greater throughput
212
wiring standards agreed upon by over 60 ISP vendors
TIA/EIA 568A and 568B
213
Used to connect a phone to a phone jack
RJ-11
214
172.16.0.0 - 172.16.255.255
private class B
215
Modem
(Modulator/Demodulator) a device that modulates signals to encode and demodulates to decode.
216
IDF
intermediate distribution frame
217
MIMO
multiple-input/multiple-output
218
convergence
the time it takes for routing tables to update
219
hybrid routing protocols
uses distance-vector metrics-based method to determine the best route, while using link state to update the other routers
220
hexadecimal
base 16 numbering system that replaces every fourth 1 and 0 with numerals 0-9 or the alphabetic letters A-F
221
What command tests connectivity between two hosts while showing each hop between the two hosts?
tracert The traceroute/tracert utility is used to report back each hop along a route to a specific IP destination.
222
SONET
(Synchronous Optical Network) transfers multiple digital bit streams over fiber-optic
223
Routing tables
small databases that routers use to determine which route to take
224
What is used to repeat a signal it receives and rebroadcast it?
repeater A repeater is a device that repeats a signal it receives in order to rebroadcast it, thus extending the range of a particular cable run. A repeater is always active and requires a power source of some sort. It has one cable coming in and one going out.
225
public class A
1.0.0.0 - 126.255.255.255
226
attenuation
degradation of a signal due to the distance the signal has to travel
227
throughput
amount of actual data that is being carried
228
What is the 4th Layer of the OSI Model?
Transport
229
latched
sturdy plastic connection
230
SYN
indicate that the segment contains synchronizing sequence numbers
231
define: protocol suite
made up of a large number of protocols that allow computers to communicate
232
Link state routing protocol
every node constructs a map of the connectivity to the network, in the form of a graph, showing which nodes are connected to which other nodes
233
F-connector
broadband and home video coaxial cable connector
234
On which OSI layer does the network interface card work?
Physical A NIC is required to work on both the Data-Link and Physical layers of the OSI model. The NIC acts as translator between the software in the upper layers of the OSI model and the physical components of the media.
235
Define: Physical layer
all aspects of physically moving data from one computer to the next.
236
hub
a node with a number of links that greatly exceeds the average.
237
where all the wires come together
cross-connect
238
broadcast
sends packets across all available computers on the network
239
What mathematical function is performed on data to ensure that it has not been changed or corrupted?
checksum Before data is sent, a mathematical calculation is done on the data and is sent with the data. When the data is received, the same mathematical calculation is done and the two checksum calculations are compared. If they are the same, the data packet has not been changed or corrupted.
240
CAT 5e
100 MHz, transmits on all four wire pairs
241
RJ-45
Ethernet data networks
242
Which layer of the OSI Model is responsible for segmenting data and sequencing it for the rest of the OSI model
Transport
243
IPv6
128-bit address, will never run out of IP addresses
244
IGMP
(Internet Group Management Protocol) used by IP hosts to manage their multicast group's dynamic membership and by connecting routers to find those group members
245
smart jack
or Network Interface Device (NID), used between the ISP and internal network
246
Private Class C IP range
192.168.0.0 - 192.168.X.X
247
CAT 2
10MHz, 4Mbps
248
Define: frame synchronization
a method of finding valid data in a transmission that consists of data frames
249
Define: connectionless protocol
does not ask for verification that a data packet has reached its destination.
250
ICMP
(Internet Control Message Protocol) checks to see if the data packets have successfully reached the destination
251
What device converts one type of media to another type?
media converter Media converters are used to convert one type of media to another type. Such devices are used to convert coaxial to twisted pair or fiber to copper. These types of devices are important for allowing two different types of technologies on the same network.
252
ACK
acknowledgement field
253
subscriber connector
SC
254
What device has each port as its own collision domain?
switch A basic switch can be referred to as a multiport bridge because like a bridge, it can separate a network out into multiple collision domains.
255
used for buildings that catch fire
plenum-rated cable
256
STP
shielded twisted pair
257
The process of moving data from one layer of the OSI model to the next layer is called
encapsulation
258
Where would you place a web server that will be accessed from the Internet?
DMZ Because a web server that needs to be accessed needs to have some security but should be isolated from the internal network, you should place the web server on the DMZ.
259
Define: Transport layer
moves data to segments then sent for data transmission
260
What connects two network segments together, yet only forwards packets based on MAC addresses from one segment to another segment only when needed?
bridge Bridges are intended to break up networks into smaller sections; as a result, they are more intelligent than your average hub. Because bridges work on the Data-Link layer of the OSI model, they can read and make sense of MAC addresses. Based on these MAC or Physical addresses, a bridge can determine whether a frame is allowed to pass through to the other side of the bridge.
261
What technology takes a voice communication, breaks the data into small packets, and sends the packets from one network segment to another?
packet switching Packet switching opens up connections only long enough for a small data packet to move from one network segment to another. Data—regardless of type, content, or structure—is broken into small blocks called packets and sent to its destination.
262
ad hoc wireless network
does not rely on a pre existing infrastructure
263
PoE (Power over Ethernet)
safetly transfers power over Ethernet cabling
264
RFC
(Request For Comment) all networking standards and protocols are defined by these various documents
265
CSMA/CA
(Carrier Sense Multiple Access with Collision Avoidance) nodes attempt to avoid collisions by transmitting only when the channel is sensed to be "idle".
266
TIA/EIA 568A is used on one end of a cable and TIA/EIA 568B is used on the other end
crossover cable
267
What type of access method does Ethernet use?
CSMA/CD Carrier Sensing Media Access/Collision Detection (CSMA/CD) is the primary method that Ethernet uses to access wired LANs. Ethernet uses a different method to access wireless LANs.
268
link aggregation
bonding method to increase link speed of multiple network cables and ports
269
What is the 5th Layer of the OSI Model?
Session
270
What communications term describes the establishment of a dedicated communications channel for the duration of a given transmission?
circuit switching In its most basic definition, circuit switching is a type of communications that establishes a dedicated communications channel for the duration of a given transmission. Initially, circuit switching was done manually, where operators would perform physical connections to establish a circuit or connection. Later, this type of switching was done electronically.
271
SSID
(Service Set Identifier) Network name for wireless
272
192.0.0.0 - 223.255.255.255
public class C
273
CAT 5
100 MHz, transmits on two pairs
274
a rack that houses cable connections
patch panel
275
private class A
10.0.0.0 - 10.255.255.255
276
private IP address
cannot be used on the Internet; is not registered with the Network Information Center
277
Ethernet\_802.3
(Novell Ethernet) does not include a Layer 2 Data Link identifier
278
hop
each time a computer or network device sends data frame to the next computer or network device
279
NTP
(Network Time Protocol) a means of synchronizing clocks over a computer network
280
To connect to a wireless network, you would start with what?
SSID of the wireless router SSID (short for Set Service Identifier) acts as the network name for a particular WAP. If you are using multiple WAPs in the same network, they will all need to have the same SSID. In Linksys WAPs, the SSID can be up to 32 characters long.
281
patch panel
a rack that houses cable connections
282
CSU/DSU
(Channel Service Unit/Data Service Unit) used to convert a digital signal from one frame format to another
283
250MHz
CAT 6
284
The encapsulation unit on the Presentation layer of the OSI Model is \_\_\_\_\_
Data
285
OSPF
(Open Shortest Path First) gathers link state information from available routers and constructs a topology map of the network
286
Well known ports
only assigned by the IANA \* can only be used by the system or root processes and by programs that are executed by privileged users
287
Dynamic or private ports
can be used at any time and are assigned dynamically by the system
288
cross-connect
where all the wires come together
289
port authentication, port-based authentication
limits access to a specific port to just certain MAC addresses.
290
Which wireless mode does not use a central WAP?
ad hoc An ad hoc wireless network is formed when a wireless network is composed of only independent wireless computers in which each device participates in forwarding wireless packets. An ad hoc wireless network has no central WAP to monitor and control it. In effect, an ad hoc wireless network is the wireless network version of a peer-to-peer network.
291
SC
sqare connector
292
The primary job of the Presentation layer concerned with
data representation and code formatting.
293
The encapsulation unit on the Data Link layer of the OSI Model is \_\_\_\_\_
Frame
294
bonding
increases network throughput by using two ore more NICs
295
unshielded twisted pair, used in all types of twisted pair Ethernet networks
UTP
296
RIP
(Routing Information Protocol) implements a limit on the number of hops allowed in a path from source to destination
297
subnetting
breaking an IP address range into smaller pieces to be used in more than one network.
298
demarcation point, last point of responsibility from the ISP
demarc
299
bandwidth
the amount or number of signals that a wire can carry
300
((N-X)) X stands for:
identifier
301
protocol suite
a group of networking protocols that are designed to work together to accomplish the separate little tasks needed to allow network communications
302
MDF
main distribution frame
303
signaling type
((N-X)) Signaling stands for:
304
Which core protocol used on the Internet moves data packets from one location on a packet-switched network to another location based on a logical address?
IP The TCP/IP model’s Internet layer is the first layer to have TCP/IP protocol suite–specific protocols. The Internet Protocol (IP) is the most important protocol on this layer and is one of the two protocols used to name the TCP/IP protocol suite.
305
IPv4
32 bits long
306
Define: de-encapsulation
bits become frames, frames become packets, packets become segments, segments become data.
307
routing metrics
used by a router to make routing decisions through a routing table
308
Older style phones
RJ-22
309
port speed
how fast a specific port on the router is able to send/receive data
310
Public Class B IP range
128.0.0.0 - 191.255.255.255
311
SOHO
(Small Office Home Office)
312
What is used to protect a network from unauthorized access?
firewall The firewall that is mentioned here, is not the "firewall" that you load onto your computer to protect it from internet attacks. A firewall is a networking device whose purpose is to prevent unauthorized packets from getting into your network. It is also used as the first line of defense between a private network and the Internet.
313
Ping
a network administration utility that is used to test connectivity to specific nodes on a network and to measure the round-trip time it takes for a packet to get to a specific destination and back
314
What protocol is used to transport and display web pages using a browser?
HTTP Hyper-Text Transport Protocol (HTTP) is used to transport Hyper-Text Markup Language (HTML) documents, otherwise known as web pages, over the Internet. HTTP can also be used to retrieve graphics, images, and other types of media and it can be used with email.
315
What is the 3rd Layer of the OSI Model?
Network
316
What type of access method is used in wireless networks?
CSMA/CA Like CSMA/CD, Carrier Sensing Media Access/Collision Avoidance (CSMA/CA) is a method used by Ethernet to access a local area network. Where CSMA/CD is most commonly used for wired networks, CSMA/CA is most commonly used for wireless networks.
317
dynamic routing
alter the path that the route takes through the system in response to a change in conditions
318
What is the 6th Layer of the OSI Model?
Presentation
319
What is used to convert digital signals from one frame format to another, specifically to convert Frame Relay into Ethernet signals?
CSU/DSU A Channel Service Unit/Data Service Unit (CSU/DSU) converts a digital signal from one frame format to another. Most commonly, it is used to convert Frame Relay or T-1 signals into Ethernet signals.
320
RS-232
Recommended Standard 232, a standard used for serial data cables connecting equipment
321
Which protocol is used to retrieve emails?
POP3 Post Office Protocol (POP) is used to connect to an email server and retrieve any emails on that server before closing the connection. When POP3 retrieves emails, it can either leave copies on the server, or delete the emails from the server after it downloads them to the client system.
322
RDP
(Remote Desktop Protocol) a remote access network protocol
323
On what OSI layer does a switch operate?
Data-LinkSwitches, like bridges, work primarily on the Data-Link layer of the OSI model.
324
MTU
(Maximum Transmission Unit)
325
broadcast networking
transmitting a packet that will be received by every device on the network
326
Which connection-oriented protocol ensures that data gets its final destination?
TCP TCP focuses on the two end devices, whereas IP focuses on getting the network packet from one device to the next toward its ultimate destination.
327
POP
(Post Office Protocol) local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection.
328
192.168.0.0 - 192.168.255.255
private class C
329
(IP)
Internet Protocol; contains IPv4 and IPv6
330
private class B
172.16.0.0 - 172.16.255.255
331
small form factor connector
SFF connector
332
Which layer of the OSI model contains all the services or protocols that are needed by application software or the operating system to communicate on the network?
Application
333
hardware loopback
a way to redirect data flow
334
T1 crossover cable
T1 applications for WAN networks
335
Which protocol is used to send messages about the network when a route goes bad?
ICMP The Internet Control Message Protocol (ICMP) is used mainly by a computer’s operating system to send messages about the network. When an error occurs in the IP packet, a service is unreachable or down, a host is not found, or a router is down, among other situations, an ICMP message is sent.
336
one bit is sent at a time
serial
337
Private Class B IP range
172.16.0.0 - 162.31.255.255
338
When a collision occurs, what do the two sending nodes do?
They both wait a random amount of time and try again. When computers on the network segment "hear" a collision on the network, they all immediately activate something called a hold-down timer. This timer is effectively a clock that activates in each NIC on the network and starts counting down from a randomly set point of time. While the clock on a particular NIC is counting down, it cannot send any packets. As each computer on the network segment finishes its random countdown, it can begin listening to the network again to find an open point where it can begin to send its data packet.
339
repeater
receives a signal and retransmits it at a power, or onto the other side of an obstruction, so that the signal can cover longer distances.
340
What networking device is used to modulate an analog signal in such a way that it can encode digital information?
modem The word modem is short for modulator/demodulator. A modem is a networking device that is used to modulate an analog signal in such a way that it can encode digital information or to demodulate the encoded signal so that it can be decoded back into something a computer can read. Any device used to encode digital information onto analog communication links, regardless of throughput, can rightfully be called a modem.
341
ACL
(Access Control List) Rules for a firewall
342
10Base-5 uses what type of cable?
coaxial Because 10Base-5 used thick coaxial cables to carry data, it was called Thick Ethernet.
343
ARP
(Address Resolution Protocol) responsible for determining what the MAC address is for the next hop and then adjust the frame accordingly so that the frame can be moved to the next hop
344
Define: TCP/IP Model
built around the TCP/IP protocol suite
345
RG-6
Old military standard
346
Lost data packets
Packets never reach their intended destination
347
What protocol is used to send and manipulate files over a TCP/IP network?
FTP The most commonly used current version of File Transfer Protocol (FTP) was first introduced in 1985 in RFC 959. However, FTP in its original form was introduced in 1971 using RFC 114.
348
Duplicate arrivals
More than one copy of the data packet arrived at the destination computer
349
EUI-64
64-bit Extended Unique Identifier; a MAC address where the host extension is 40-bits long; creates a unique interface identifier through IPv6
350
degradation of a signal due to the distance the signal has to travel
attenuation
351
\_\_\_\_\_ are used for node-to-node communications on a network. Logical address, Port address, Physical address, Socket
Physical Address
352
Distance-Vector Routing Protocol
when each router periodically sends an update of its routing table to all the neighboring routers that are direcrtly connected to it
353
multiple-input/multiple-output
MIMO
354
can only carry 1 signal at a time
baseband cable
355
Which wireless encryption is considered the weakest?
WEP Available encryption schemes are WPA Enterprise and Personal, WPA2 Enterprise and Personal, RADIUS, and WEP. Of these options, WEP is the weakest.
356
PSTN
Public Sswitched Telephone Network
357
TCP/IP Protocol Suite
A group of protocols to carry out the functions needed to communicate across a network
358
IMAP
(Internet Mail Access Protocol) used by e-mail clients to retrieve e-mail messages from a mail server over a TCP/IP connection.
359
LEDs
light emitting diodes
360
IPv4
32-bit address
361
SNMP
(Simple Network Management Protocol) manages devices on IP networks
362
Ethernet data networks
RJ-45
363
What protocol is used to assign IP addresses automatically to a host?
DHCP DHCP was first introduced in RFC 1541 in 1993 and was intended as a replacement for the older and less wieldy BOOTP. DHCP assigns IP addresses and IP configurations automatically for the host.
364
classful subnet mask for a Class C IP address
255.255.255.0
365
EUI
Extended Unique Identifiers; the variations of MAC addresses
366
CAT 3
16MHz, 10Mbps
367
T1 applications for WAN networks
T1 crossover cable
368
Define: segment
Data going to the Transport layer.
369
Define: LLC
Logical Link Control sublayer, facilitate communications between the upper Network layer and the Physical layer.
370
attach stations to the network
BNC connector
371
100 MHz, transmits on two pairs
CAT 5
372
(STP) Spanning Tree Protocol
used by switches when multiple switches are used in the same network
373
identifier
((N-X)) X stands for:
374
sturdy plastic connection
latched
375
What is the 1st Layer of the OSI Model?
Physical
376
Which layer of the OSI model is concerned with reliably getting data from one computer to another
Data Link
377
What is the copper version of Gigabit Ethernet?
1000Base-T 1000Base-T is the copper version of Gigabit Ethernet and was standardized in 1999. The standard used for copper-based Gigabit Ethernet was IEEE 802.3ab, which was designed to use CAT 5, 5e, or 6.
378
What type of server acts as an intermediary between a client and other servers?
proxy server Proxy servers act as intermediaries between a client and other servers. They can fulfill many roles and can be used for many different jobs.
379
time interval between responses
latency
380
In what type of network segment do computers have the possibility of having their signals collide with each other?
collision domain A network segment where computers have the possibility of having their signals collide with each other is called a collision domain. If too many computers are on a single collision domain, a network can reach a point where it has so many collisions, no computers can actually communicate with each other. Therefore, the goal of a hub-based network is to have as few computers as possible on a single collision domain.
381
Transient host group
host group formed for a specific multicast and then disbanded after use
382
checksum
when a network device receives a data packet from another network device, it runs an algorithm on the header of the IP packet and then compares the result of this algorithm with the result stored in the IP header
383
Define: logical addresses
logically assigned depending on the Networking layer protocol being used
384
Ethernet\_802.2
identifier included to enable the frame header to work with the Data Link layer
385
NID
network interface device(NID), or smart jack, used between the ISP and internal network
386
10.0.0.0 - 10.255.255.255
private class A
387
protocol stack
all the protocols from a protocol suit that are currently being used to carry out specific functions of network communications within the computer
388
Which Ethernet frame type supports TCP/IP?
Ethernet II The most widely used Ethernet frame type is Ethernet II or Ethernet DIX. It is so widely used because the Internet Protocol (IP) can use it directly.
389
intelligent hub
functions for network management, bridging, routing and switching.
390
binary
using 1s and 0s to represent hexadecimal
391
What is the 2nd Layer of the OSI Model?
Data Link
392
The most important protocol on the Internet layer of the TCP/IP model is \_\_\_\_\_
Internet Protocol
393
What protocol do multiple switches on the same network use to ensure that an infinite loop is not created?
STP Spanning Tree Protocol (STP) is used when multiple switches are implemented on the same network. As a Data-Link layer protocol, STP is used primarily to prevent endless loops from developing on switch-based LANs. The protocol gets its name from a mathematical algorithm called "spanning tree," which takes a group of points and connects them all together without allowing any loops to form.